<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Deploying SSL decryption with Public CA in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/deploying-ssl-decryption-with-public-ca/m-p/10380#M7644</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class="MsoNormal"&gt;I am trying to figure out how to deploy SSL decryption. I have it working in a test environment using an in house CA and by importing the cert. into my browser. As we have Firefox users and can't export the Trusted Root CA with a GPO, I am looking for an alternative. As a CA beginner, I am struggling with some of the concepts.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;If a buy a cert for a known CA (godaddy - as I like Danica Patrick), can I use that cert on my PA and will the browser trust it? I have PAs at 5 locations (some HA pairs). Do I have to buy 5 certs (or more) or can I share the same cert?&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Any advise would be great.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 03 Feb 2011 20:41:55 GMT</pubDate>
    <dc:creator>john.langford@aplp.net</dc:creator>
    <dc:date>2011-02-03T20:41:55Z</dc:date>
    <item>
      <title>Deploying SSL decryption with Public CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/deploying-ssl-decryption-with-public-ca/m-p/10380#M7644</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class="MsoNormal"&gt;I am trying to figure out how to deploy SSL decryption. I have it working in a test environment using an in house CA and by importing the cert. into my browser. As we have Firefox users and can't export the Trusted Root CA with a GPO, I am looking for an alternative. As a CA beginner, I am struggling with some of the concepts.&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;If a buy a cert for a known CA (godaddy - as I like Danica Patrick), can I use that cert on my PA and will the browser trust it? I have PAs at 5 locations (some HA pairs). Do I have to buy 5 certs (or more) or can I share the same cert?&lt;/P&gt;&lt;P class="MsoNormal"&gt;&lt;/P&gt;&lt;P class="MsoNormal"&gt;Any advise would be great.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Feb 2011 20:41:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/deploying-ssl-decryption-with-public-ca/m-p/10380#M7644</guid>
      <dc:creator>john.langford@aplp.net</dc:creator>
      <dc:date>2011-02-03T20:41:55Z</dc:date>
    </item>
    <item>
      <title>Re: Deploying SSL decryption with Public CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/deploying-ssl-decryption-with-public-ca/m-p/10381#M7645</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi John,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is not possible to purchase the correct Certificate Authority cert from a trusted public source since only Server certs are sold.&amp;nbsp; Also, if this were allowed, it would invalidate the trust ecosystem that Certificates are based on, since then it would be possible to do trusted man-in-the-middle attacks out in the wild.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Palo Alto Networks SSL decryption solution works best when the CA cert is generated from an internal CA that is already trusted in the company or that can be pushed out to the user's browser via global policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kelly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Feb 2011 21:32:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/deploying-ssl-decryption-with-public-ca/m-p/10381#M7645</guid>
      <dc:creator>kbrazil</dc:creator>
      <dc:date>2011-02-03T21:32:33Z</dc:date>
    </item>
    <item>
      <title>Re: Deploying SSL decryption with Public CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/deploying-ssl-decryption-with-public-ca/m-p/10382#M7646</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi John,&lt;/P&gt;&lt;P&gt;If you use (and you should use) a Trust (internal) CA certificate you need only one cert, the CA cert and you have to import it in every PAN device you have.&lt;/P&gt;&lt;P&gt;Otherwise yuou can generate a Self Signed Certificate or a server certificate issued by your internal CA for every PAN devices you have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You dont' have to use and import a Trust Root CA in your web browser but a Subordinate CA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First of all, I suggest you tu have a look some PKI documentation. Undestanding PKI is very important to use effectively PAN SSL-D&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Feb 2011 15:23:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/deploying-ssl-decryption-with-public-ca/m-p/10382#M7646</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2011-02-04T15:23:28Z</dc:date>
    </item>
    <item>
      <title>Re: Deploying SSL decryption with Public CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/deploying-ssl-decryption-with-public-ca/m-p/10383#M7647</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you having a problem with Firefox specifically? I was able to get SSL decryption working using our internal CA and IE browsers on the domain, but Firefox does not seem to pick up the CAs in the Windows store, which caused some issues. Not sure if there is a solution to this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Feb 2011 20:08:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/deploying-ssl-decryption-with-public-ca/m-p/10383#M7647</guid>
      <dc:creator>KGC</dc:creator>
      <dc:date>2011-02-04T20:08:11Z</dc:date>
    </item>
    <item>
      <title>Re: Deploying SSL decryption with Public CA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/deploying-ssl-decryption-with-public-ca/m-p/10384#M7648</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class="MsoNormal"&gt;Firefox is the main problem. IE is not really am problem - I can use a GPO for the certs. Chrome uses the same certs as IE, s that works. But our friend Firefox does not seem to have an enterprise solution to management it (for certs or other configs - we had a similar issue when deploying proxy settings).&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Feb 2011 20:12:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/deploying-ssl-decryption-with-public-ca/m-p/10384#M7648</guid>
      <dc:creator>john.langford@aplp.net</dc:creator>
      <dc:date>2011-02-04T20:12:58Z</dc:date>
    </item>
  </channel>
</rss>

